Sciweavers

1580 search results - page 124 / 316
» Non-Interference Through Determinism
Sort
View
COMPSEC
2004
91views more  COMPSEC 2004»
13 years 10 months ago
Predicting the intrusion intentions by observing system call sequences
Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...
COMCOM
2000
73views more  COMCOM 2000»
13 years 10 months ago
On video coding algorithms with application level QoS guarantees
To transfer video streams with the application level QoS (Quality of Service) guarantees on the end-to-end transfer delay and the video quality, the coding algorithm and parameter...
Naoki Wakamiya, Masayuki Murata, Hideo Miyahara
NAR
2000
85views more  NAR 2000»
13 years 10 months ago
MAGEST: MAboya Gene Expression patterns and Sequence Tags
MAGEST is a database for newly identified maternal cDNAs of the ascidian, Halocynthia roretzi, which aims to examine the population of the mRNAs. We have collected 3 and 5 tag seq...
Takeshi Kawashima, Shuichi Kawashima, Minoru Kaneh...
CGF
1999
91views more  CGF 1999»
13 years 10 months ago
Efficient and Handy Texture Mapping on 3D Surfaces
There has been a rapid technical progress in three-dimensional (3D) computer graphics. But gathering surface and texture data is yet a laborious task. This paper addresses the pro...
Kenji Matsushita, Toyohisa Kaneko
JAL
1998
74views more  JAL 1998»
13 years 10 months ago
A Survey of Fast Exponentiation Methods
Public-key cryptographic systems often involve raising elements of some group (e.g. GF(2n), Z/NZ, or elliptic curves) to large powers. An important question is how fast this expon...
Daniel M. Gordon